{"id":1011,"date":"2017-06-12T10:29:59","date_gmt":"2017-06-12T10:29:59","guid":{"rendered":"http:\/\/www.adlice.com\/?p=1011\/"},"modified":"2022-12-21T10:33:47","modified_gmt":"2022-12-21T10:33:47","slug":"signature-numerique","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/fr\/signature-numerique\/","title":{"rendered":"Qu&#8217;est ce que la signature num\u00e9rique?"},"content":{"rendered":"\n<p>Lors de l\u2019ex\u00e9cution d\u2019un ex\u00e9cutable en provenance d\u2019Internet, <strong>tout le monde a d\u00e9j\u00e0 \u00e9t\u00e9 confront\u00e9 \u00e0 ce genre d\u2019avertissements<\/strong>:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"414\" height=\"310\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher.jpg\" alt=\"\" class=\"wp-image-1789\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher.jpg 414w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher-300x225.jpg 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Unknown_Publisher-320x240.jpg 320w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><figcaption class=\"wp-element-caption\">Source : trishtech.com<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"342\" height=\"199\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher.png\" alt=\"\" class=\"wp-image-1790\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher.png 342w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/UAC_Unknown_Publisher-300x175.png 300w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><figcaption class=\"wp-element-caption\">Source : blogspot.ch<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><strong>Ces fichiers binaires ne sont pas sign\u00e9s num\u00e9riquement<\/strong> et, en cons\u00e9quence, Windows affiche un avertissement concernant les potentiels risques de s\u00e9curit\u00e9 que l\u2019utilisateur encourt en les ex\u00e9cutants. Mais, quelle est la r\u00e9elle signification de cela ?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Signature de Code et Signature Num\u00e9rique<\/h2>\n\n\n\n<p>Une <strong>signature num\u00e9rique<\/strong> peut \u00eatre ins\u00e9r\u00e9e dans n\u2019importe quel fichier ex\u00e9cutable (.exe, .msi, etc.), librairie (.dll) ou pilote (.sys) de mani\u00e8re \u00e0 v\u00e9rifier leur <strong>authenticit\u00e9<\/strong> et <strong>int\u00e9grit\u00e9<\/strong>.<\/p>\n\n\n\n<p>Cette signature comprend un <strong>certificat num\u00e9rique<\/strong> contenant de nombreuses informations telles que l\u2019\u00e9diteur du logiciel, la date \u00e0 laquelle le fichier a \u00e9t\u00e9 sign\u00e9, la dur\u00e9e de validit\u00e9 de la signature et bien d\u2019autres.<\/p>\n\n\n\n<p>Un <strong>certificat de signature de code<\/strong> peut \u00eatre obtenu via une <strong>Autorit\u00e9 de Certification (AC)<\/strong> telle que Verisign pour environ deux cents dollars par an. Du point de vue de l\u2019AC, <strong>octroyer un certificat signifie qu\u2019elle accorde sa confiance \u00e0 l\u2019\u00e9diteur du logiciel et, par extension, que les fichiers signifi\u00e9s par le certificat sont de confiance<\/strong>.<\/p>\n\n\n\n<p><strong>Les fichiers binaires non sign\u00e9s ne sont pas forc\u00e9ment malicieux<\/strong>, mais l\u2019absence de signature num\u00e9rique signifie que <strong>l\u2019int\u00e9grit\u00e9 du fichier ne peut pas \u00eatre garantie<\/strong> et que, par cons\u00e9quent, il est possible qu\u2019il ait \u00e9t\u00e9 alt\u00e9r\u00e9 de fa\u00e7on malicieuse ou distribu\u00e9 par un \u00e9diteur ill\u00e9gitime.<\/p>\n\n\n\n<p>Comme nous l\u2019avons vu ci-dessus, la confiance est le coeur de la signature de code. <strong>Les Autorit\u00e9s de Certification doivent \u00eatre certaines de ne pas octroyer de certificats de signature de code \u00e0 des concepteurs de malware<\/strong>. Ainsi, avant tout octroi, une v\u00e9rification des ant\u00e9c\u00e9dents du demandeur est effectu\u00e9e de mani\u00e8re \u00e0 v\u00e9rifier la l\u00e9gitimit\u00e9 de la demande.<\/p>\n\n\n\n<p>Les certificats de signature de code existent sous deux formes : <strong>Standard et Extended Validation (EV)<\/strong>. Les certificats EV pr\u00e9sentent un <strong>bien plus haut niveau de cr\u00e9dibilit\u00e9<\/strong> et <strong>n\u00e9cessitent des v\u00e9rifications importantes pour \u00eatre octroy\u00e9s<\/strong>. Ils sont \u00e9galement bien plus on\u00e9reux et ne peuvent pas \u00eatre partag\u00e9s sur plusieurs ordinateurs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exemple<\/h2>\n\n\n\n<p>Examinons un logiciel contenant une signature num\u00e9rique. Dans cet exemple, nous nous focaliserons sur <strong>Adlice PEViewer Portable x64<\/strong> (RogueKillerPE64.exe). A l\u2019ex\u00e9cution, l\u2019avertissement est diff\u00e9rent :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/openfile_known_publisher\/\" rel=\"attachment wp-att-1008\"><img decoding=\"async\" width=\"414\" height=\"310\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher.png\" alt=\"\" class=\"wp-image-1008\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher.png 414w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher-300x225.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/OpenFile_Known_Publisher-320x240.png 320w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>L\u2019\u00e9diteur du logiciel est reconnu en tant que \u00abAdlice \u00bb et, si vous cliquez sur le lien, le certificat num\u00e9rique confirmant la validit\u00e9 de la signature est affich\u00e9.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/digital_certificate\/\" rel=\"attachment wp-att-1009\"><img decoding=\"async\" width=\"419\" height=\"489\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate.png\" alt=\"\" class=\"wp-image-1009\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate.png 419w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Digital_Certificate-257x300.png 257w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>En utilisant l\u2019utilitaire Microsoft SignTool, il est possible d\u2019obtenir des informations suppl\u00e9mentaires sur la <strong>chaine de confiance<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted lang:default decode:false\">Signature Index: 0 (Primary Signature)\nHash of file (sha1): E63D964581A42E57C6BF711BF89B4D25B8F902AB\nSigning Certificate Chain:\n    Issued to: DigiCert Assured ID Root CA\n    Issued by: DigiCert Assured ID Root CA\n    Expires:   Mon Nov 10 02:00:00 2031\n    SHA1 hash: 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 \n        Issued to: DigiCert SHA2 Assured ID Code Signing CA\n        Issued by: DigiCert Assured ID Root CA\n        Expires:   Sun Oct 22 14:00:00 2028\n        SHA1 hash: 92C1588E85AF2201CE7915E8538B492F605B80C6 \n            Issued to: Adlice\n            Issued by: DigiCert SHA2 Assured ID Code Signing CA\n            Expires:   Thu Jun 28 14:00:00 2018\n            SHA1 hash: C8181FABBC35C7B433596F82CE687C6D453DB570\n<\/pre>\n\n\n\n<p>&nbsp;<br>En lisant de bas en haut, nous pouvons affirmer que <strong>l\u2019Editeur du logiciel est, comme nous l\u2019avons vu au-dessus, \u00ab Adlice \u00bb and que le certificat a \u00e9t\u00e9 octroy\u00e9 par l\u2019AC DigiCert en utilisant le certificat \u00ab DigiCert SHA2 Assured ID Code Signing CA \u00bb<\/strong> qui \u00e0 \u00e9t\u00e9 lui-m\u00eame g\u00e9n\u00e9r\u00e9 \u00e0 partir du certificat \u00ab DigiCert Assured ID Root CA \u00bb.<\/p>\n\n\n\n<p>Le certificat num\u00e9rique contient \u00e9galement le <strong>hash du fichier (SHA1 hash)<\/strong>. Le contenu de ce champ est utilis\u00e9 pour d\u00e9terminer si le fichier a \u00e9t\u00e9 alt\u00e9r\u00e9 en le comparant avec le hash du fichier courant. <strong>Si les valeurs des deux hashes ne sont pas \u00e9quivalentes, le syst\u00e8me d\u00e9tecte l\u2019alt\u00e9ration<\/strong>, invalidant la signature et affichant un avertissement :<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/www.adlice.com\/what-is-code-signing\/invalid_digital_certificate\/\" rel=\"attachment wp-att-1010\"><img decoding=\"async\" width=\"419\" height=\"489\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate.png\" alt=\"\" class=\"wp-image-1010\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate.png 419w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/Invalid_Digital_Certificate-257x300.png 257w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Malware et Signature de Code<\/h2>\n\n\n\n<p>Depuis plusieurs ann\u00e9es, Microsoft encourage fortement les d\u00e9veloppeurs \u00e0 signer num\u00e9riquement leurs produits. Avec l\u2019arriv\u00e9e de Windows Vista et la propagation des rootkits Windows, <strong>les drivers noyau ne peuvent \u00eatre charg\u00e9s que s\u2019ils sont sign\u00e9s<\/strong>.<\/p>\n\n\n\n<p>Peux-ton ainsi faire aveugl\u00e9ment confiance aux fichiers num\u00e9riquement sign\u00e9s ? La r\u00e9ponse est non. I<strong>l existe des malware qui ont \u00e9t\u00e9 num\u00e9riquement sign\u00e9s<\/strong>. Par exemple, <a href=\"https:\/\/virustotal.com\/en\/file\/81fdbf04f3d0d9a85e0fbb092e257a2dda14c5d783f1c8bf3bc41038e0a78688\/analysis\/\">cet \u00e9chantillon de Ransomware Razy<\/a> est sign\u00e9 par un certificat octroy\u00e9 par l\u2019Autorit\u00e9 de Certification Comodo.<\/p>\n\n\n\n<p>Les Autorit\u00e9s de Certification peuvent \u00eatre abus\u00e9es par des requ\u00eates sp\u00e9cialement con\u00e7ues pour passer les v\u00e9rifications, mais le plus souvent, <strong>les malware num\u00e9riquement sign\u00e9s utilisent des certificats vol\u00e9s \u00e0 des d\u00e9veloppeurs ou des organisations<\/strong>.<\/p>\n\n\n\n<p>Le vol de certificats est bien s\u00fbr pr\u00e9judiciable aux utilisateurs qui pourraient \u00eatre infect\u00e9s en faisant confiance \u00e0 un ex\u00e9cutable auquel ils n\u2019auraient pas d\u00fb, mais \u00e9galement \u00e0 l\u2019organisation victime du vol, en raison du <strong>co\u00fbt administratif<\/strong> et de la <strong>mauvaise r\u00e9putation<\/strong>.<\/p>\n\n\n\n<p>Les certificats de signature de code doivent \u00eatre <strong>prot\u00e9g\u00e9s par mot de passe<\/strong> et stock\u00e9 \u00e0 un emplacement s\u00fbr.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Changements de politique<\/h2>\n\n\n\n<p>Changement dans la politique de Signature de Code dans Windows 10 Anniversary Edition (1607) et son implication sur les outils Adlice. Avec la sortie de Windows 10 version 1607, <strong>Microsoft impose \u00e0 pr\u00e9sent que les drivers noyaux soient sign\u00e9s avec des certificats EV<\/strong>.<\/p>\n\n\n\n<p>Comme nous l\u2019avons vu plus haut, les certificats EV sont davantage s\u00e9curis\u00e9s car les pr\u00e9requis pour les obtenir sont importants et la probabilit\u00e9 qu\u2019ils soient vol\u00e9s est pratiquement nulle \u00e9tant donn\u00e9 qu\u2019ils sont li\u00e9s <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Hardware_security_module\">au mat\u00e9riel (HSM)<\/a>. Cependant, <strong>leurs prix est un inconv\u00e9nient majeur<\/strong> pour les d\u00e9veloppeurs ind\u00e9pendants et les petites soci\u00e9t\u00e9s. Adlice Software est dans cette situation.<\/p>\n\n\n\n<p>Depuis 2014, RogueKiller utilise du <strong>code noyau<\/strong> pour d\u00e9tecter efficacement les rootkits. Etant donn\u00e9 que nous n\u2019utilisons pas de certificat EV, <strong>le chargement du driver noyau de RogueKiller peut \u00e9chouer sur les versions de Windows 10 1607 et sup\u00e9rieures<\/strong>. L\u2019outil continuera de fonctionner, mais ses capacit\u00e9s seront r\u00e9duites.<\/p>\n\n\n\n<p>Si vous vous trouvez dans ce cas de figure et d\u00e9sirez que le driver se charge, il est n\u00e9cessaire de <a href=\"https:\/\/msdn.microsoft.com\/fr-fr\/library\/windows\/hardware\/dn898540%28v=vs.85%29.aspx\">d\u00e9sactiver Secure Boot<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>La signature de code est une <strong>approche tr\u00e8s prometteuse<\/strong> pour prot\u00e9ger les utilisateurs des contenus malveillants, pour authentifier l\u2019\u00e9diteur d\u2019un ex\u00e9cutable et pour prot\u00e9ger un fichier contre des modifications non-d\u00e9sir\u00e9es.<\/p>\n\n\n\n<p>Pour le moment, <strong>une signature num\u00e9rique ne signifie pas forc\u00e9ment qu\u2019un fichier est s\u00fbr<\/strong>. Si, dans le futur les certificats EV devenaient abordables et plus facile \u00e0 obtenir, il se pourrait que cela devienne une v\u00e9rit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.<\/p>\n","protected":false},"author":1,"featured_media":1013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[558,559,101],"class_list":["post-1011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyse","tag-code-fr","tag-signature-numerique","tag-windows-fr","category-54","description-off"],"views":1336,"yoast_score":69,"yoast_readable":60,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu&#039;est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-12T10:29:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"Qu&#8217;est ce que la signature num\u00e9rique?\",\"datePublished\":\"2017-06-12T10:29:59+00:00\",\"dateModified\":\"2022-12-21T10:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\"},\"wordCount\":1075,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"keywords\":[\"code\",\"signature num\u00e9rique\",\"windows\"],\"articleSection\":[\"Analyse\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\",\"url\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\",\"name\":\"Qu'est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"datePublished\":\"2017-06-12T10:29:59+00:00\",\"dateModified\":\"2022-12-21T10:33:47+00:00\",\"description\":\"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/fr\/signature-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg\",\"width\":1000,\"height\":563},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/fr\/signature-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu&#8217;est ce que la signature num\u00e9rique?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/fr\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu'est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software","description":"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/fr\/signature-numerique\/","og_locale":"fr_FR","og_type":"article","og_title":"Qu'est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software","og_description":"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.","og_url":"https:\/\/www.adlice.com\/fr\/signature-numerique\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2017-06-12T10:29:59+00:00","article_modified_time":"2022-12-21T10:33:47+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"\u00c9crit par":"tigzy","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"Qu&#8217;est ce que la signature num\u00e9rique?","datePublished":"2017-06-12T10:29:59+00:00","dateModified":"2022-12-21T10:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/"},"wordCount":1075,"publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","keywords":["code","signature num\u00e9rique","windows"],"articleSection":["Analyse"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/","url":"https:\/\/www.adlice.com\/fr\/signature-numerique\/","name":"Qu'est ce que la Signature Num\u00e9rique ? | Validation \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","datePublished":"2017-06-12T10:29:59+00:00","dateModified":"2022-12-21T10:33:47+00:00","description":"La signature num\u00e9rique est requise pour charger un driver Windows. Elle dit \u00e9galement si une application est de confiance. Analyse.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/fr\/signature-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/06\/digisig.jpg","width":1000,"height":563},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/fr\/signature-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Qu&#8217;est ce que la signature num\u00e9rique?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/fr\/#website","url":"https:\/\/www.adlice.com\/fr\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/fr\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/fr\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/1011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/comments?post=1011"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/posts\/1011\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media\/1013"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media?parent=1011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/categories?post=1011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/tags?post=1011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}